good luck getting billions of legacy devices patched (hint: they're not)An attack scenario includes an adversary identifying Bluetooth devices nearby and using commonly tools to identify the MAC address of vulnerable Bluetooth devices.
“By probing the device, the attacker can determine which operating system his victim is using, and adjust his exploit accordingly. The attacker will then exploit a vulnerability in the implementation of the Bluetooth protocol in the relevant platform and gain the access he needs to act on his malicious objective,” researchers wrote.
At this stage the attacker can choose to create a Man-in-the-Middle attack and control the device’s communication, or take full control over the device and use it for a wide array of cybercriminal purposes, researchers stated.
Blueborne [Bluetooth exploit]
Moderators: Bakhtosh, EvilHomer3k
- hitbyambulance
- Posts: 10252
- Joined: Wed Oct 13, 2004 3:51 am
- Location: Map Ref 47.6°N 122.35°W
- Contact:
Blueborne [Bluetooth exploit]
https://www.androidcentral.com/lets-tal ... nerability
- coopasonic
- Posts: 20982
- Joined: Fri Mar 04, 2005 11:43 pm
- Location: Dallas-ish
Re: Blueborne [Bluetooth exploit]
Crap. I need to patch my deadbolt. If I ever thought I would have to patch my front door, this is not the sort of patching I was imagining.
-Coop
Black Lives Matter
Black Lives Matter